SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Secure Device Pairing based on a Visual Channel (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Multichannel Security Protocols
IEEE Pervasive Computing
Authenticating ad hoc networks by comparison of short digests
Information and Computation
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
SPATE: Small-Group PKI-Less Authenticated Trust Establishment
IEEE Transactions on Mobile Computing
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Exploiting empirical engagement in authentication protocol design
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.01 |
Security protection is critical to body sensor networks, since they collect sensitive personal information. Generally speaking, security protection of body sensor network relies on key distribution protocols. Most existing key distribution protocols are designed to run in general wireless sensor networks, and are not suitable for body sensor networks. After carefully examining the characteristics of body sensor networks, we propose an Elliptic Curve Diffie Hellman version of Symmetric Hash commitment before knowledge protocol (ECDH-SHCBK). Thanks to ECDH-SHCBK, dynamically distributing keys becomes possible. As opposite to present solutions, this protocol does not need any pre-deployment of keys or secrets. Therefore, compromised and expired keys can be easily changed. This protocol exploits human users as temporary trusted third parties. We, thus, show that the human interactive channels can help us to design secure body sensor networks.